Advertisement

ISD Coordination

  • Adrian Perrig
  • Pawel Szalachowski
  • Raphael M. Reischuk
  • Laurent Chuat
Chapter
Part of the Information Security and Cryptography book series (ISC)

Abstract

In this chapter, we describe how ISDs are discovered and how they coordinate with each other, especially when a new ISD is created. The goal is for each ISD to have a list of all other ISDs — specifically, an identifier and a description for each ISD along with the roots of trust that enable authentication. An authority could create such a list and distribute it, but this would conflict with SCION’s goal that each ISD can operate independently and communicate with other ISDs without any globally trusted entity.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Adrian Perrig
    • 1
  • Pawel Szalachowski
    • 2
  • Raphael M. Reischuk
    • 3
  • Laurent Chuat
    • 4
  1. 1.Network Security Group, CAB F 85.1ETH ZürichZürichSwitzerland
  2. 2.Network Security Group, CAB F 85.2ETH ZürichZürichSwitzerland
  3. 3.Network Security Group, CAB F 83ETH ZürichZürichSwitzerland
  4. 4.Network Security Group, CAB F 86.1ETH ZürichZürichSwitzerland

Personalised recommendations